
REVISION
Authored by ABDIRASHID GUHAD
Information Technology (IT)
6th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. State any two ways in which computers can be protected from viruses.
a) _____________________
b) _____________________
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
1. State three ways in which viruses spread to computer.
a) _____________________
b) _____________________
c) _____________________
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Define the following terms used in ICT.
a. Cybercrime: ________________________________________________
b. Hacking: ___________________________________________________
c. Software piracy: _____________________________________________________
4.
OPEN ENDED QUESTION
3 mins • 1 pt
Which law of a computer crime should be enforced to someone who takes something from someone without his/her permission?
Evaluate responses using AI:
OFF
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
List three health risk solutions for the excessive and improper use of computer.
a) _____________________
b) _____________________
c) _____________________
a) Take regular breaks
b) Use ergonomic furniture
c) Engage in physical activity
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Outline any five computer rules that you know.
a) _____________________
b) _____________________
c) _____________________
d) _____________________
e) _____________________
a) Always save your work frequently.
b) Keep your software updated.
c) Use strong passwords and change them regularly.
d) Avoid clicking on unknown links or attachments.
e) Back up your data regularly.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
State and explain the three laws that have been enforced to protect people from computer crimes.
a) _____________________
b) _____________________
c) _____________________
a. Data protection Act:To ensure that people know how personal information about them are being used.
b. Copyright Act:
To protect the work of people from being copied by others.
c. Cybercrime Act:
To protect the computer system from unauthorized access or use by a person.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?